| Literature DB >> 30149582 |
Muhammad Burhan1, Rana Asif Rehman2, Bilal Khan3, Byung-Seo Kim4.
Abstract
The use of the Internet is growing in this day and age, so another area has developed to use the Internet, called Internet of Things (IoT). It facilitates the machines and objects to communicate, compute and coordinate with each other. It is an enabler for the intelligence affixed to several essential features of the modern world, such as homes, hospitals, buildings, transports and cities. The security and privacy are some of the critical issues related to the wide application of IoT. Therefore, these issues prevent the wide adoption of the IoT. In this paper, we are presenting an overview about different layered architectures of IoT and attacks regarding security from the perspective of layers. In addition, a review of mechanisms that provide solutions to these issues is presented with their limitations. Furthermore, we have suggested a new secure layered architecture of IoT to overcome these issues.Entities:
Keywords: Internet of Things (IoT); layered architectures; privacy; protection methods; secure architecture; security; security attacks
Year: 2018 PMID: 30149582 PMCID: PMC6165453 DOI: 10.3390/s18092796
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Application domains of IoT.
Comparison of different application domains of IoT.
| Home/Office | City | Transportation | Agriculture | Retail | |
|---|---|---|---|---|---|
|
| Very Few | Many | Many | Few | Few |
|
| RFID and WSN | RFID and WSN | WSN | WSN | RFID and WSN |
|
| Small | Medium | Large | Medium | Small |
|
| Wi-Fi, 3G, 4G | Wi-Fi, 3G, 4G | Wi-Fi, Satellite | Wi-Fi, Satellite | Wi-Fi, 3G, 4G |
|
| Small | Large | Medium | Medium | Small |
|
| Smart Home | Smart Cities | Few | PSCM System | Retail centers |
| [ | [ | [ | [ |
Figure 2Number of connected IoT devices from 2012 to 2020.
Figure 3The IoT elements.
The elements and key technologies of IoT.
| IoT Elements | Technologies | |
|---|---|---|
| Identification | Naming | Electronic, Product Code, Ucode |
| Addressing | IPv4, and IPv6 | |
| Sensing | Smart, Sensors, RFID Tags, Wearable Sensing | |
| Communication | Radio Frequency Identification, Wireless Sensor Network, Near Field | |
| Computation | Hardware | Audrino, Raspherry Pi, Intel Galil |
| Software | Operating System | |
| Services | Identity-Related, Information Aggregation, Collaborative-Aware and Ubiquitous | |
| Semantics | RDF, OWL, EXI | |
Figure 4The three-layered architecture of IoT.
Figure 5The four-layered architecture of IoT along recommended security mechanisms.
Figure 6The layered architectures of IoT (three, four and five layers).
Figure 7The architectures of ZigBee.
Figure 8The layered architecture of a wireless sensor network.
Comparison of different communication technologies used in IoT.
| Technologies | Mechanism | Security | Applications | Characteristics | Drawbacks |
|---|---|---|---|---|---|
| ZigBee | Wireless | Encryption, | Home and | Low consumption, | Fixed key |
| Bluetooth | Wireless | Encryption, | PDA, Mobiles | Cable replacement, | Blue jacking, |
| RFID | Frequency | Encryption | Health care | Data capturing with | No |
| WSN | Wireless | Key, Encryption, | Buildings and | Low Cost, Power, | DOS attack |
| Wi-Fi | Radio | Authentication, | PC, Phones | Faster, Secure, | Eavesdropping |
| 5G Network | Wireless | Authentication, | Phone, IoT and | Faster, Secure, | Distributed DoS |
Figure 9Existing security mechanisms to protect the IoT applications.
Figure 10The PKI like protocol for IoT.
Figure 11IP based open authorization system for IoT.
Figure 12The key security concerns in IoT.
Figure 13Identity management framework for cloud based IoT applications.
Figure 14Association of SDN with IoT as a security solution.
Figure 15Preference based privacy protection system for IoT.
Figure 16Identity based personal location system for IoT.
Comparison of existing mechanisms along description with respect to security for IoT.
| Method’s Name with Layer | Description | Issues Which It Address |
|---|---|---|
| Hashed Based Encryption [ | Hash Functions are used along | It is used to check the integrity of the |
| PKI protocol [ | Base station sends message to destination and has the public key. | It does not compromise about security |
| Secure Authorization Mechanism [ | Client - Server based System. | Client send a request to server in order |
| Lightweight Cryptographic | Keys are used to convert messages. | It is used to convert a message from |
| Embedded Security Framework [ | It provides not only security but | It provides secure secondary storage, |
| Identity Management Framework [ | It has two fragments of it; identity | It confirms from identity module which |
| Risk based Adaptive Framework [ | Four portions an each portion do | It stores the information about attack |
| SDN with IoT [ | SDN is used for better performance | All communication is occurred by SDN |
| Cooperation of Nodes based | Node sends information to a trust | It works on ad hoc communication |
| Reputation System based | Node maintains two data structures; | It works on ad hoc communication |
| Cluster based Intrusion Detection | Detects intruder by computing trust | It detects and prevents the intruder by |
| Preference Based Privacy | Communication occurs by service | A third party organization acts like a |
| Access Control Mechanism [ | Simple Mechanism in order to | |
| OpenHab [ | Provide security so people started | Simple registration but does not |
| IoTOne [ | Solve the issues occurred in the | Clients send the request to server in |
| Identity based Security | It consists of four subsystem; | Policy based Framework that controls |
Figure 17An improved layered architecture for IoT.
Figure 18Research challenges and future directions in IoT.